zustand-store-ts
Pass
Audited by Gen Agent Trust Hub on Feb 13, 2026
Risk Level: LOWNO_CODE
Full Analysis
The skill consists of a markdown file (SKILL.md) describing its purpose and usage, a TypeScript template file (assets/template.ts), and an acceptance criteria markdown file (references/acceptance-criteria.md).
- SKILL.md: This file provides instructions and examples for creating Zustand stores. It references the
assets/template.tsfile for users to copy. It does not contain any executable commands for the agent. - assets/template.ts: This is a static TypeScript code template. It defines interfaces, initial state, and a Zustand store using
createandsubscribeWithSelectorfrom thezustandlibrary. The template includes a commented-outfetchItems()call, which is a placeholder for user implementation and does not perform any actual network requests or file operations as provided. The skill itself does not execute this TypeScript file; it is intended for the user to copy and adapt. - references/acceptance-criteria.md: This file contains informational content about correct and incorrect Zustand patterns. It is purely documentation and does not contain any executable code or instructions for the agent.
Threat Assessment:
- Prompt Injection: No patterns indicative of prompt injection were found in any of the files.
- Data Exfiltration: No commands or code snippets were found that attempt to read sensitive files or exfiltrate data to external servers.
- Obfuscation: No obfuscation techniques (e.g., Base64, zero-width characters, homoglyphs, URL/hex/HTML encoding) were detected.
- Unverifiable Dependencies: The skill itself does not install or download any external dependencies. The provided template code uses the
zustandlibrary, which is a well-known and trusted state management library. Users are expected to have this dependency installed in their own projects, but the skill does not manage this. - Privilege Escalation: No commands for privilege escalation (e.g.,
sudo,chmod 777, service installation) were found. - Persistence Mechanisms: No attempts to establish persistence (e.g., modifying shell configurations, creating cron jobs) were detected.
- Metadata Poisoning: The metadata in
SKILL.mdis benign and accurately describes the skill's function. - Indirect Prompt Injection: The skill provides code templates. While the code generated by the skill could theoretically be used in a system susceptible to indirect prompt injection if it processes untrusted input, the skill itself does not process external data in a way that would lead to indirect prompt injection of the skill.
- Time-Delayed / Conditional Attacks: No conditional logic for time-delayed or environment-specific attacks was found.
Conclusion: The skill is designed to provide a code template and documentation. It does not execute any code, perform system modifications, or interact with external resources in a malicious way. Therefore, it is deemed safe.
Audit Metadata